Controlling access to FlashCopy commands

The following are two ways to protect access to FlashCopy® commands: